I can't think of a reason as to why you'd want to create a hidden volume in VeraCrypt. It says because "you may be asked to hand the information," but why would I need to hand it over? Nobody has any ...

first of all, sorry if my question is not clear, because English is not my first language. Anyway, let-me explain the concept I'm struggling to solve as the best solution. I have some guys, and they ...

I was wandering at superuser and I found this question: Compress and then encrypt, or vice-versa?
Nearly all files have a Magic Number at a certain position in them. So, I wonder if I can attack (to ...

It is fairly well known that on Windows, when you delete a file (or folder which may contain any number of files and subfolders possibly containing other files and subfolders and so on), Windows just ...

A recent discussion on another website prompted a proclamation that storing (TrueCrypt, LUKS, DMG, etc) on cloud sync services like Dropbox is unsafe, since a version history is kept of each file, and ...

There are encryption softwares like veracrypt which encrypt data and the only way to open encrypted file is via Password.
But a simple compressing softwares like RAR also provide password protection.
...

It appears that Stackfield is one of the only functioning applications that combines end to end encryption, messaging services and file sharing. Peerio has just been launched (literally a day or two ...

How can security be enhanced to the maximum in a messaging app storing messaging history on the device (like whatsapp)?
I am specifically referring to methods to minimize the risk of the data being ...

I want to store encrypted files on some storage backend that allows me to fetch bytes X through Y of the encrypted file. I can obviously decrypt the entire file locally and send it back to the client.
...

My boss wants to set up encrypted file shares using EFS on Windows Server 2012 R2 Boxes accessed by Windows 8.1 clients. I've been able to set the default DRA, issue certificates in test cases and so ...

I have previously used TrueCrypt for creating encrypted directories on servers.
I am now trying ecryptfs due to the end of development announcement in May.
I see that when I encrypt a directory and ...

One common technique I use is xor bruteforcing on binary data. In this case, I would like a heuristic approach to determine whether or not any possible candidate plaintexts are javascript. This rules ...

Is there an implementation of a file-sharing network protocol where the server has no idea what data is being stored, but can serve the encrypted files to clients that will decrypt them on-the-fly (if ...

I have a thought.
1. Take a file.
2. Read number of bytes. If its less than 2048, padd it till 2048
3. Read each byte. And create a single file which contains the particular byte. Give a random name ...

I am trying to understand the Networking And Cryptography Library (NaCL).
Consider i have a file that i want to send to multiple recipients. PGP or S/MIME supports multiple recipients by encrypting ...

Suppose I work for a bank and am asked to write an NFC payment app for the iPhone 6 or Android but not use Apple Pay. To simply send the credit card details to the reader via NFC.
Now assume I'm not ...

We are building a portal where users can upload few materials. we have been successful in using the command lines of linux to convert doc,ppts to pdf directly through the server but we are not able to ...

I have an application that runs on some host machine and generates logs. Later in the day those logs are securely transmitted to my machine.
The problem is that while the logs are being generated I ...

I wrote a huffman encoding program that can compress and decompress files.
The file contains a header which contains information that allows me to retrieve the huffman tree.
I wanted to add a simple ...

This weekend I took part in an security challenge. I had great fun doing it but i found a huge gap in my knowledge that I'm really keen to fill and hope someone here can help get me pointing in the ...

I am a Python / C developer currently working on a extremely important piece of software. The details of the code will not be mentioned, and the only place the code appears is on my own hard drive, in ...

I've been inspired by the answer to the question here: Location to store an encryption key
It gave me a lot to think about.
My friend and I are building a website and we've encountered a problem in ...

Is this recommended or a good/normal practice? I think not.
Because I saw that OwnCloud stores all encryption keys in one directory on the server.
One directory contains the private key(s) and one all ...

I have a server which has 'loose' physical security (somewhat easy for the entire server to get stolen).
For the sake of the question, let's assume that anyone can access the server physically, what ...